Processing method and device as well as acquisition method and device for security information
A security information and processing method technology, applied in the field of security information processing method and device, acquisition method and device, can solve problems such as different security algorithms and keys, inability to achieve security isolation of different network slices, and inability to provide different network slices , to achieve security isolation and improve access security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example
[0070] First embodiment
[0071] Such as figure 2 As shown, the first embodiment of the present invention provides a method for processing security information, and the processing method includes:
[0072] Step 101: The access control function entity generates security information;
[0073] Step 102: Send the security information to the control entity.
[0074] It should be noted that the access control function entity provided in the embodiment of the present invention may be AAA or HSS. Among them, AAA is Authentication Authorisation Accounting, authentication authorization accounting; HSS is Home Subscriber Server, home subscriber server
[0075] Such as image 3 Shown is the system architecture of a method for a terminal to access a network slice according to an embodiment of the present invention. The system architecture separates the authentication and authorization functions from each network slice to form an independent function, namely image 3 The access control function in ...
Example
[0107] Second embodiment
[0108] The second embodiment of the present invention provides a method for obtaining security information of a terminal, which is applied to network slicing, and the obtaining method includes:
[0109] Step 201: Receive terminal security information sent by the access control function entity; or,
[0110] Step 301: Send a first request message to the access control function entity, where the first request message carries the identification of the terminal requesting access to the network slice, and the first request message is used to request to obtain the security of the terminal. information;
[0111] Step 302: Receive security information of the terminal sent by the access control function; or,
[0112] Step 401: Receive an access request message of a terminal sent by an access device, where the access request message carries security information of the terminal.
[0113] Specifically, step 201 is that the access control entity actively provides the termin...
Example
[0117] The third embodiment
[0118] The third embodiment of the present invention provides a method for acquiring security information of network slicing, which is applied to a terminal and includes:
[0119] Step 501: Receive security information of each network slice subscribed by the terminal sent by the access control function entity; or,
[0120] Step 601: Send a second request message to an access control function entity, where the second request message carries information about the network slice accessed by the terminal, and the second request message is used to request to obtain the security of the network slice. information;
[0121] Step 602: Receive the security information of the network slice sent by the access control function entity.
[0122] Specifically, step 501 is actively provided for the access control function, which means that it sends to the terminal the security information of each network slice subscribed by the terminal during the authentication process (or...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap